Sciweavers

1071 search results - page 204 / 215
» Solving Geometric Constraint Systems
Sort
View
TIP
2010
107views more  TIP 2010»
14 years 4 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
76
Voted
WWW
2010
ACM
15 years 4 months ago
Fast and parallel webpage layout
The web browser is a CPU-intensive program. Especially on mobile devices, webpages load too slowly, expending significant time in processing a document’s appearance. Due to powe...
Leo A. Meyerovich, Rastislav Bodík
SISW
2003
IEEE
15 years 2 months ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
JNW
2006
126views more  JNW 2006»
14 years 9 months ago
Gateway Deployment optimization in Cellular Wi-Fi Mesh Networks
With the standardization of IEEE 802.11, there has been an explosive growth of wireless local area networks (WLAN). Recently, this cost effective technology is being developed aggr...
Rajesh Prasad, Hongyi Wu
ISBI
2004
IEEE
15 years 10 months ago
Volumetric Harmonic Brain Mapping
Brain surface conformal mapping research has been successful and this motivates our more general investigation of 3D volumetric brain harmonic mapping. By transforming the full 3D...
Yalin Wang, Xianfeng Gu, Tony F. Chan, Paul M. Tho...